We live in a time where everything is network connected, ranging from trash cans that let you know they are almost full to dynamic business websites on which you can fully customize the product you want to order via a visual configurator. Whether these network connected systems provide business functionality, when breached, they can all have a security impact to your organization.
Irrelevant of what your organization does, how big or small it is, and what its customers are, we all are targets of a certain type of threat actors. During this presentation we will provide you with an overview of different types of threat actors and why you are a target as well. But don't worry. It's not because you are a target that you should become a victim as well ! We'll touch on various aspects on how you can secure your organization and your applications (prevent a breach), give some insights into how you can detect threat actors trying to get in (detect), and what to do in case they succeed (respond).
U kan inloggen om het volledig overzicht van bestanden te raadplegen.
- 🔒 materiaal.pdf (Enkel voor SAI leden)